Results 41 to 50 of about 4,682 (204)
Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks [PDF]
We investigate beamforming and artificial noise generation at the secondary transmitters to establish secure transmission in large scale spectrum sharing networks, where multiple noncolluding eavesdroppers attempt to intercept the secondary transmission.
Deng, Y +4 more
core +2 more sources
Joint 3D Beamforming and Trajectory Design for UAV-Enabled Mobile Relaying System
The goal of this paper is to investigate the security performance of the multi-antenna unmanned aerial vehicle (UAV)-enabled mobile relaying system with a multi-antenna destination in the presence of a multi-antenna eavesdropper.
Quansheng Yuan +3 more
doaj +1 more source
Physical-Layer Security Enhancement via Relay-Aided D2D Communications Underlaying Cellular Networks
In this paper, we propose a relay-assisted device-to-device (D2D) communication as an underlay in a cellular network, where two sequential best relay nodes based on different selection criteria are chosen.
Jules M. Moualeu, Telex M. N. Ngatched
doaj +1 more source
In this paper, optical code division multiple access (OCDMA) based hybrid free-space optical (FSO)/fiber wiretap channel is proposed, and the physical-layer security is analyzed theoretically, using the conditional secrecy outage probability as ...
Jianhua Ji +3 more
doaj +1 more source
The article presents an analysis of the physical layer security of a wireless communication system functioning in the presence of multipath fading and a wiretap.
Aleksey S. Gvozdarev +1 more
doaj +1 more source
Location-Based Beamforming for Rician Wiretap Channels
We propose a location-based beamforming scheme for wiretap channels, where a source communicates with a legitimate receiver in the presence of an eavesdropper.
Liu, Chenxi, Malaney, Robert
core +1 more source
Secrecy Outage Probability of Network-Coded Cooperative Communication
We evaluate the secrecy performance of a multiple access cooperative network where the destination node is wiretapped by a malicious and passive eavesdropper. We propose the application of the network coding technique as an alternative to increase the secrecy at the destination node, on the top of improving the error performance of the legitimate ...
Rebelatto, João Luiz +4 more
openaire +2 more sources
Cooperative Transmission for Security Enhancement in Clustered Wireless Sensor Networks
We study opportunistic decode-and-forward relaying transmission in cooperative cluster-based wireless sensor networks (WSNs) with secrecy constraints, where a passive eavesdropper may overhear the source message.
Weiwei Yang, Songqing Wang, Xiaoming Xu
doaj +1 more source
Secrecy outage of threshold-based cooperative relay network with and without direct links
In this paper, we investigate the secrecy outage performance of a dual-hop decode-and-forward (DF) threshold-based cooperative relay network, both with and without the direct links between source-eavesdropper and source-destination. Without assuming that
Khyati Chopra, Ranjan Bose, Anupam Joshi
doaj +1 more source
On the Analysis of Secrecy Outage Probability Using Average Channel Capacity
In this article, we analyze the outage probability of physically secure wireless signal transmission in fading envi-ronments where both primary and eavesdropper channels are subject to generalized fading. We propose a novel approach using the average channel capacity of the primary channel and that of the eavesdropper channel to the outage probability ...
openaire +5 more sources

